Skip to content
This repository has been archived by the owner on Jul 17, 2023. It is now read-only.

Extension for Apache Guacamole which enforces additional restrictions on users and user groups.

License

Notifications You must be signed in to change notification settings

glyptodon/guacamole-auth-restrict

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

guacamole-auth-restrict

guacamole-auth-restrict is an authentication extension for Apache Guacamole which enforces additional restrictions on users and the members of user groups. These restrictions may be specified through either of two possible methods:

  1. User attributes, which will be presented as fields within the user edit screen for users managed by extensions that support administration (such as the various database authentication extensions).
  2. Membership within predefined, special user groups.

If defining restrictions via user attributes, the scope of the restrictions is isolated to the objects within the extension storing those attributes.

If defining restrictions via group membership, keep in mind that restrictions will only take effect if membership in the relevant group is defined by the backend authenticating the user. This means that if users will be authenticating against LDAP, it is not sufficient to associate those users with the applicable group within a database backend like MySQL or PostgreSQL; they must be added to an LDAP group with the same name.

Blocking concurrent access

Similar to the concurrent access restrictions provided by the database authentication extensions, blocking concurrent access prevents users from connecting to connections or connection groups that are already in use.

To block concurrent access:

  • Set the addl-restrict-disallow-concurrent user attribute to true. If using an extension that supports administration, this may be done through the user edit screen.
  • Declare that a specific group should block concurrent access by listing that group's name within the disallow-concurrent-groups property. Multiple groups may be listed, separated by commas.

Forcing read-only access

Forcing read-only access blocks interaction with all connections and connection groups. Users will still be able to establish connections, but will not be able to interact with those connections using the keyboard, mouse, clipboard, etc.

To force read-only access:

  • Set the addl-restrict-force-read-only user attribute to true. If using an extension that supports administration, this may be done through the user edit screen.
  • Declare that a specific group should force read-only access by listing that group's name within the read-only-groups property. Multiple groups may be listed, separated by commas.

About

Extension for Apache Guacamole which enforces additional restrictions on users and user groups.

Resources

License

Stars

Watchers

Forks

Packages

No packages published